IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
10 Jul 2012
Microsoft repairs dangerous XML Core Services zero-day flaw
The Microsoft XML Core Services vulnerability is being actively targeted by cybercriminals. In addition, Microsoft issued a critical update to Internet Explorer 9. Continue Reading
By- Robert Westervelt, TechTarget
-
Opinion
09 Jul 2012
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
By- Brian Honan
-
News
09 Jul 2012
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jul 2012
Virus could cut 20,000 UK computers from web on Monday, FBI warns
The DNS Changer virus could cause 20,000 computers in the UK – of 350,000 worldwide - to lose web access on 9 July, the FBI has warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2012
BT extends cyber security agreement with MoD
BT is to extend its cyber security agreement with the Ministry of Defence (MoD) in a deal to expand its cyber defence service Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2012
Cyber Risk Perceptions: An Industry Snapshot
Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals. Continue Reading
-
Photo Story
28 Jun 2012
The technology behind the Wimbledon tennis championships
We venture into the IBM bunker to see the IT operation behind the world's most famous tennis tournament. Continue Reading
By- Bryan Glick, Editor in chief
-
News
27 Jun 2012
White House cyber security coordinator Howard Schmidt joins Qualys
Former White House cyber security coordinator Howard Schmidt is to join the board of security and compliance company Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
RBS set to sue supplier CA Technologies for software failure
Reports claim RBS is gearing up for legal action against US software supplier CA Technologies over the technical fault that crashed accounts Continue Reading
By- Jennifer Scott, TechTarget
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
Six arrested in the UK in worldwide FBI-led credit card data sting
Six people in the UK and 12 in the US arrested in an FBI-led sting operation that netted a total of 24 credit card cyber fraudsters in 13 countries Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
26 Jun 2012
Techniques for preventing a brute force login attack
A brute force login attack can enable an attacker to log in to an application and steal data. Rob Shapland explains how to prevent brute force attacks. Continue Reading
By -
News
25 Jun 2012
Web surfers keen to compromise own privacy, study finds
Web users voluntarily compromise their own privacy by typing more personal information into online forms than is needed, a study has found Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2012
RBS and NatWest online services unavailable
Some Royal Bank of Scotland (RBS) and NatWest Bank customers cannot access online services as the banking group experiences a computer problem. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
19 Jun 2012
CISM and CRISC named as highest earning IT qualifications
IT Skills and Certifications Pay Index places two ISACA qualifications at the top of the highest-earning IT certifications list Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
18 Jun 2012
Ethiopian government blocks Tor Network online anonymity
The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Jun 2012
Data Protection Masterclass: Global Privacy
This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions. Continue Reading
-
Tutorial
13 Jun 2012
Maltego user guide part 2: Infrastructural reconnaissance
This part of our Maltego tutorial details how you can use the multi-faceted tool for infrastructural aspects of information gathering. Continue Reading
By- Karthik Poojary, Amazon
-
Tip
12 Jun 2012
Risk management for cloud computing deployments
Cloud risk management involves more than meets the eye. Our expert details risk management for public cloud setups in this multi-part series. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
12 Jun 2012
2012: Will this be the year TPM finally comes of age?
Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jun 2012
eHarmony, Last.fm join LinkedIn with password leaks
Online dating site eHarmony and Last.fm have joined LinkedIn with password leaks, as hackers focus on social networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2012
Enabling rapid and effective IT recovery
This report from analyst, Freeform Dynamics, offers 7 key enablers of effective IT disaster recovery for IT department's in small and medium companies. Continue Reading
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
06 Jun 2012
Royal Signals ‘Unsung Heroes’ Awards
IT experts from the Royal Signals were rewarded for their support and commitment to the service during an event for "unsung heroes" at Mansion House. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
06 Jun 2012
Majority of UK websites fail to comply with cookie law
Most UK websites are not yet compliant with the newly enforced cookie law, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
01 Jun 2012
13 Android security apps
Keep your Android mobile device secure with our recommendations for Android security apps. Use these must-have 13 Android security apps and sleep easy. Continue Reading
By- Karthik Poojary, Amazon
-
News
01 Jun 2012
Former MI5 boss loses laptop
The former boss of the UK's MI5 security service has caused a security scare by losing her laptop at Heathrow. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2012
BT helps itself to Home Hubs for public Wi-Fi
A feature of BT's routers called Fon gives away a percentage of bandwidth from home-based Wi-Fi to passers-by, often without user consent. Continue Reading
By- Jennifer Scott, TechTarget
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
UK regulator PhonepayPlus shuts down Angry Birds smartphone scam
UK users of Android smartphones have been targeted by premium-rate phone scams masquerading as popular apps such as Angry Birds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2012
Video: ICO publishes new guidance on cookie law
The Information Commissioner's Office (ICO) has published new guidance on cookie law and revealed the organisations it has approached on the issue Continue Reading
By- Warwick Ashford, Senior analyst
-
Video
24 May 2012
Screencast: Employ the FOCA tool as a metadata extractor
Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites. Continue Reading
-
News
21 May 2012
Global software piracy increasing rapidly, study shows
Global software piracy is increasing rapidly in the absence of any effective deterrence, a survey has revealed. Continue Reading
-
Answer
18 May 2012
File upload security best practices: Block a malicious file upload
Do your Web app users upload files to your servers? Find out the dangers of malicious file uploads and learn six steps to stop file-upload attacks. Continue Reading
By -
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
18 May 2012
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products. Continue Reading
By- Tracey Caldwell, Contributor
-
Tip
17 May 2012
Information security budgets: Five steps to obtain management buy-in
Getting management to approve security budgets is difficult. Here are guidelines to help you prepare and present information security budgets effectively. Continue Reading
By- Sanil Nadkarni, Capitas
-
News
17 May 2012
The Pirate Bay is latest site to be hit by DDoS attack
The Pirate Bay has become the latest high-profile website to be hit by a distributed denial-of-service (DDoS) attack Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
17 May 2012
Maltego tutorial - Part 1: Information gathering
Maltego is a powerful OSINT information gathering tool. Our Maltego tutorial teaches you how to use Maltego for personal reconnaissance of a target. Continue Reading
By- Karthik Poojary, Amazon
-
Tip
14 May 2012
POS terminal security: Best practices for point of sale environments
Securing point of sale (POS) environments can be tricky. Shobitha Hariharan and Nitin Bhatnagar share comprehensive POS terminal security best practices. Continue Reading
By- Shobitha Hariharan & Nitin Bhatnagar
-
News
11 May 2012
Court stops Dutch party sharing Pirate Bay links
A court in The Hague has ordered a political party in the Netherlands to stop publicising ways to get around blocks to Swedish file-sharing site, The Pirate Bay Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 May 2012
Cyber attackers increasingly targeting applications, research shows
Web and mobile applications are the new frontiers in the war against cyber attack, according to an HP cyber security risks report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2012
Government snooping plans unveiled
The Queen's Speech has revealed that the government still plans to make it easier for security and police services to spy on e-mails, phone calls and internet activity Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
09 May 2012
Burp Suite Tutorial PDF compendium: WebApp tester’s ready reference
Our Burp Suite tutorial PDF compendium is a collection of our Burp Suite guides in PDF format made available to you for free offline reference. Continue Reading
By- SearchSecurity.in Staff
-
News
04 May 2012
UK to expand cyber info-sharing hub after initial success
A public/private cyber security initiative exposed a campaign of malicious emails targeting UK defence companies, Cabinet Office minister Francis Maude has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2012
Microsoft to fix 23 vulnerabilities in May 2012 Patch Tuesday
Microsoft said it plans to address flaws in Windows, Office, Silverlight and the .NET Framework. Continue Reading
By- SearchSecurity.com Staff
-
News
03 May 2012
SOCA takes its website offline in DDoS response
Just days after SOCA shut down carder sites, the agency was the victim of a DDoS attack, leading SOCA to takes its website offline. Continue Reading
By- Jane Wright, TechTarget
-
Photo Story
03 May 2012
11 security audit essentials
IT security audit tools automate the IT security audit process, making it more efficient and effective. Here are 11 must-have IT security audit tools. Continue Reading
By- Karthik Poojary, Amazon
-
News
02 May 2012
US to legislate to protect Facebook passwords from employers
The US is planning legislation that will protect Facebook passwords from prying employers Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
30 Apr 2012
InfoSecurity Europe: Odd Bugs
A selection of photos showing how far exhibitors will go to get people to their stands at InfoSecurity Europe 2012... Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Apr 2012
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Apr 2012
SOCA shuts down network of CVV sellers' carder sites
The Serious Organised Crime Agency shut down 36 CVV sellers who were selling stolen credit card and banking credentials to buyers around the world. Continue Reading
By -
Feature
26 Apr 2012
Essar’s WAN encryption strategy to secure data in motion: In focus
Indian conglomerate Essar puts WAN encryption in place using Cisco’s GET VPN to protect data flows between remote locations. A closer look. Continue Reading
By- Varun Haran, Reporter
-
News
26 Apr 2012
Infosec 2012: Unscrubbed hard drives a threat to business, says ICO
Unscrubbed hard drives on computers that are decommissioned and sold on represent a significant risk to business Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2012
Infosec 2012: Internet security body to tackle SSL problems
The Trustworthy Internet Movement (TIM) is to tackle implementation and governance internet communication protocol (SSL) as its first project. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2012
Infosec 2012: Patching alone can deliver 80% protection
Keeping software up to date with security patches can deliver 80% protection from cyber threats, says security firm Secunia. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Apr 2012
Infosec 2012: Cloud enables security expertise for SME
Small and medium enterprises (SMEs) typically face the same threats as bigger organisations, but lack the same level of expertise and other security resources. Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
24 Apr 2012
Infosecurity Europe
With 300 exhibitors and hundreds of delegates, security is still hot on the IT agenda. Cliff Saran presents the highlights of infosecurity Europe Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Apr 2012
Investigation reveals serious cloud computing data security flaws
Context Information Security found that data stored by a cloud customer could be accessed by the next customer to spin up a VM on the same disk. Continue Reading
By -
Tip
24 Apr 2012
6 point SIEM solution evaluation checklist
With SIEM solutions gaining steam in India, Satish Jagu of Genpact shares concise tips based on the lessons from his SIEM implementation experiences. Continue Reading
By- Satish Jagu
-
News
24 Apr 2012
2012 Information Security Breaches Survey
Security breaches cost the UK billions over the last 12 months as cyber attacks reached record levels. Continue Reading
-
News
23 Apr 2012
UK firms see competitors as greater cyber attack risk than criminals
More than half of UK firms expect a cyber attack in the next six months, but see competitors as a greater risk than criminals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Apr 2012
FCC fines Google $25k for hampering Street View Wi-Fi data harvesting probe
Federal Communications Commission fines Google $25k for obstructing investigation into harvesting Wi-Fi data for Google Maps' Street View Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
16 Apr 2012
Exploit development tutorial - Part Deux
In our exploit development tutorial’s second part, we examine how you can write exploits in PERL. Then we see how to port exploits by scripting in Ruby. Continue Reading
By- Karthik Poojary, Amazon
-
News
11 Apr 2012
Busy security patch month for Microsoft administrators
Microsoft has released six patches, four critical, for 11 vulnerabilities in Office, Windows and various server products in its April security update. Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
02 Apr 2012
Information security intelligence demands network traffic visibility
Use the network and host data at your disposal to create business-focused information security intelligence policies and strategies. Continue Reading
By- Aaron Turner, Contributor
-
News
02 Apr 2012
UK business fears impact of new EU data protection framework
More than half of senior UK IT managers in large enterprises believe the proposed new EU data protection framework will cost their business more money, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Apr 2012
Eight UK universities awarded excellence in cyber security research status
The first eight UK universities have been awarded 'Academic Centre of Excellence in Cyber Security Research' status Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Apr 2012
Fighting Economic Crime in the Financial Services sector
PwC examines the impact of Cybercrime on the financial services industry. Continue Reading
-
News
30 Mar 2012
SIEM deployment case study shows patience is required
Williams Lea’s SIEM is already helping reduce manual log reviews. But there’s still a lot of work to be done before the SIEM can be fully deployed. Continue Reading
By -
Photo Story
29 Mar 2012
Sandboxing for secure app development: Adobe Reader’s 'protected view'
As sandboxing emerges as an answer to legacy codebases with multiple vulnerabilities, we look at the components of Adobe Reader X’s sandbox. Continue Reading
By- Disha Agarwal, Contributor
-
News
27 Mar 2012
Warwickshire-based company to revamp data protection following breach
A Warwickshire-based company has committed to taking action to protect personal data, following a breach of the Data Protection Act Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
27 Mar 2012
Exploit writing tutorial: Part 1
In the first part of our exploit writing tutorial, we take a look at the fine art of vulnerability discovery, fuzzing and usable techniques. Continue Reading
By- Karthik Poojary, Amazon
-
News
26 Mar 2012
Barclays Bank card data vulnerable to mobile phone scanning fraud
Channel 4 News has revealed fraudsters can access the data on Barclays Bank cards by scanning them with mobile phones Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
26 Mar 2012
Department for Work and Pensions outsources IT for universal credit welfare to India
The government is outsourcing IT development for the universal credit welfare programme to India despite promises to keep data projects in the UK Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Mar 2012
Information management: lessons from the public sector
Freeform Dynamics identifies the lessons organisations can learn from the public sector's approach to information management Continue Reading
By- Martha Bennett, Forrester Research Inc.
-
News
21 Mar 2012
Half of education institutions victims of mobile IT theft
According to research, 45% of UK education establishments claim to have had mobile IT equipment stolen during the last three years. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
Feature
20 Mar 2012
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Continue Reading
By- Varun Haran, Reporter
-
News
19 Mar 2012
Study: Shnakule, four other malnets caused most 2011 attacks
Huge global malnets, such as Shnakule, were responsible for most attacks in 2011, and Blue Coat predicts they will trigger 66% of all attacks in 2012. Continue Reading
By -
News
19 Mar 2012
UK hacktivist cases should spur business to action, says lawyer
The last of four alleged UK members of hacktivist group LulzSec has appeared in Westminster magistrates court in London Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Mar 2012
SourceForge takes down Anonymous operating system
The open-source collaboration website SourceForge has taken down an Ubuntu Linux OS project purportedly affiliated with online hactivist group Anonymous, after a review by security experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Mar 2012
BBC cyber attacks highlight difficulty of attribution
The BBC has said it is was targeted by cyber attacks following a campaign by Iran against its Persian service, but stopped short of accusing Tehran of ordering the cyber attacks Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
14 Mar 2012
10 Wi-Fi security tools for your arsenal
With Wi-Fi’s growth, security administrators and pen testers alike have their hands full. Here’s a list of essential Wi-Fi security tools to ease the stress. Continue Reading
By- Karthik Poojary, Amazon
-
News
13 Mar 2012
Hackers expose weak security on Digital Playground porn site
A hacking group claims to have stolen the details of more than 70,000 users of the Digital Playground porn site Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Mar 2012
Apple iOS 5.1 patches 81 vulnerabilities
Alongside its ‘new iPad’ release, Apple Inc. releases iOS 5.1, the latest version of its mobile computing platform with fixes for 81 security holes. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Mar 2012
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. Continue Reading
By- Varun Haran, Reporter
-
News
07 Mar 2012
FBI informer Hector Xavier Monsegur aids in arrest of LulzSec hackers
Authorities in the US, UK and Republic of Ireland have arrested seven suspected members of hacktivist group LulzSec, including Hector Xavier Monsegur, who helped investigators Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
05 Mar 2012
Session fixation protection: How to stop session fixation attacks
Session fixation attacks rely on poorly managed Web application cookies. Rob Shapland answers a reader’s question on session fixation protection. Continue Reading
By -
News
05 Mar 2012
Rogue IT manager jailed for two years after £123k procurement scam
A rogue IT procurement manager has been jailed for two years after he colluded with two IT suppliers to defraud grocer Nisa Today out of £123,000 Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
02 Mar 2012
Opinion: Is big data just big hype?
If the deluge of headlines and vendor marketing materials is anything to go by, big data is the next big thing. So how much is there really to all this big data talk? Continue Reading
By- Martha Bennett, Forrester Research Inc.
-
News
02 Mar 2012
2012 security outlook
This report, based on extensive research from chief information security officers, identifies the top 10 security imperatives for 2012. Continue Reading
-
News
01 Mar 2012
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Mar 2012
DWP tenders for £25m IDA services
The Department for Work and Pensions (DWP) has tendered for a £25m identity assurance (IDA) framework to create a marketplace of providers across the public sector. Continue Reading
By- Kathleen Hall, TechTarget
-
News
29 Feb 2012
IT departments risk losing responsibility for IT security
IT security professionals can no longer take it for granted that IT security will continue as part of the IT function Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
28 Feb 2012
Social media to support business continuity
Three-quarters of organisations will use social media as part of their business continuity management (BCM) strategies by 2015 with communication during crises a key component of its role. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Feb 2012
Post Office reveals plans for identity assurance services
The Post Office is tendering for hardware and software which will enable it to be a provider of the government's Identity Assurance (IDA) services. Continue Reading
By- Kathleen Hall, TechTarget
-
Photo Story
25 Feb 2012
The CISO Power List, 2012
Our CISO Power List for 2012 brings you the who’s who in the Indian information security scene. Join us, as we pay tribute to India’s top 15 CISOs. Continue Reading
By- Varun Haran, Reporter
-
News
24 Feb 2012
Windows security case study: Controlling Windows 7 user privileges
After migrating from Windows XP to Windows 7, Oxford University Press used Avecto’s Privilege Guard to control Windows 7 user privileges. Continue Reading
By